Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    25/06/2024, 02:59

General

  • Target

    d5f25209ed3d62912af4861406431e603015e6eb1665d05fcbab4b082fc94359.exe

  • Size

    715KB

  • MD5

    2683435f8356b41552418e5cc12d331d

  • SHA1

    87a2d1896275282d7f3e94215fc47b48d0799877

  • SHA256

    d5f25209ed3d62912af4861406431e603015e6eb1665d05fcbab4b082fc94359

  • SHA512

    6470969180651b766b3e0b295a750f35d9d4a09674b51dd427d3dbf9e03f3eee9b66873915f24ac4edb78b62575d2e493d3fca454b78f0bfb2db1d2f65ca6f1b

  • SSDEEP

    12288:E6RZu520Z1CNRPZvgmY3Z3mTiUY7ZfxTvjorwDtVglN:EqK7Z8pvT2ZdUYTTjoBX

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 35 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5f25209ed3d62912af4861406431e603015e6eb1665d05fcbab4b082fc94359.exe
    "C:\Users\Admin\AppData\Local\Temp\d5f25209ed3d62912af4861406431e603015e6eb1665d05fcbab4b082fc94359.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\program files (x86)\internet explorer\wmpscfgs.exe
      "C:\program files (x86)\internet explorer\wmpscfgs.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2832
      • C:\program files (x86)\internet explorer\wmpscfgs.exe
        "C:\program files (x86)\internet explorer\wmpscfgs.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2576
      • C:\program files (x86)\internet explorer\wmpscfgs.exe
        "C:\program files (x86)\internet explorer\wmpscfgs.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1936
      • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1432
    • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2152
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {2A0A48DB-C784-45AD-A991-7B4FB8CCD7D8} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2564
    • \??\c:\program files (x86)\internet explorer\wmpscfgs.exe
      "c:\program files (x86)\internet explorer\wmpscfgs.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1984
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1960
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1960 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2064
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1960 CREDAT:603141 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6efe0ed59227f8b67169b6fc3c5c5333

    SHA1

    e44da083b6d99b3599b50cc606f8a3183a7ed60f

    SHA256

    8e26d6a37317d6eae798d657723f111a8f89aa3b41933ed5e1d075efc538d67a

    SHA512

    d5fb535b266a7b2c553e5e127191079c9f1da95f0dce6b646ffdcd4c85d6f161af8969abf83e3a1ffd600ac977de789041d3eec0a9ef4a10c5b1f181e8323424

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    dd46c0e984e37815f6d6ed54672fa37d

    SHA1

    f7070671fde1dd5b46a476490cd002350c0cb761

    SHA256

    2a66a79a464d494086d76d66330ae0753b7273ec9e7ba82c7b84e62a3840f5a7

    SHA512

    050dcfdf1b44f550d79865f998051ea7b6a3309d78b404ea53a144c8e0e60b8ce58fb4a8688550127579f31af989f23e18e390b231921a07a24f8ee539d5d1dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    361eb58cc140e75b28374747ad80097d

    SHA1

    7f8ec47fcdb64939a6944a8598316231aeee7a28

    SHA256

    89db0e4f7addaaa987aec05010eb13cc6672beff1649e6c6d9f891127d59ac8c

    SHA512

    372138c8202b350233041f939e0589d5cc5a60a70a8ef500c8941f55ce989bf356e72c7bbe8279411c2964a626a506dad02191e9056d3738ca94e1cb929ef50c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b4331812d988fc8775cf60d084c6998d

    SHA1

    95f44ca4e161379960b9b38e8d9f0244153a2820

    SHA256

    4f70bba41936a14aaeb35f92dd85f8b5af7d46c0fd8eec8845aad64d28296ed0

    SHA512

    ea87e51ce07ce2fbfa4ed5be611a4b58c47a73c485108fa255baabe122d52d6aec56b2d2194b19faf578ba84c4eb78d610cb8e5dcac6b3ba27628bcdf50c95b5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    1ecddab50b159ae84e26148572085ac0

    SHA1

    9519e2a0ddb21a475b123cb65236fabd5456e6dc

    SHA256

    de85e907a3376f2d67ec10a5808c62fcb556fd7de6cd833602f71caa56524f82

    SHA512

    b224c42799b4a635e32ddcc6d6a654328bf65aa6df98f06c2ea31b8cef736439e1b12f8025b9eff391b05d30bc389993810afa1265bf4dee822d7141a73fdd5d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    8138bd3c77e2b8f69bdd4dd7dd87d1fc

    SHA1

    71f0ebb78a3f3443c4e5c17cf4ecea1131a2091f

    SHA256

    cf93cad6fdf874eaae1d515d63d4e7057503a5f4628e36da71b0981ac82fb831

    SHA512

    d51a04e3b9b3c866b0216e208332352f6e52442d2274189d0cf4745666d78ae6049ca2ec02a19fdda6d413e6540ae06fc19e219805d01a384a580a02fe8c94d5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cb68ea708827fe43212d085b7bcd8f5e

    SHA1

    7599a29f5b3716d1a4ceacdae77b43777af276b3

    SHA256

    ed69e2922ed7ef5420d0e2c3208c2f43d83f59215f7e336f9100c4e65ce22960

    SHA512

    0796e11eefd35b797c48db2570b75fbc640b4b4bdb05b947c8a85e75e0566aca617a3d79de5fd05cca3514fce071b0bc029073ee204c208a1926e326b3ab79bd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    daf270eb21111995d5415c7800925c54

    SHA1

    fd228a6a51860a1c916731a09a01c95ba10860aa

    SHA256

    82c0681f5e8aeabe02ee3844c3fd17d7e4e11ec3d2b965ef1b0e614b05e38e61

    SHA512

    b99540cc4b21d1c30c092a33c34f8a62df38b4db7ee06a214c6163d39b9173c3db8d41aea4df1f7ace481209af01c0ab394b19218707a393bdecc2852b4a9489

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4ee88fb0661c930ac3dba8300a858280

    SHA1

    1398e25916ea2aee01fe2e595d233a0c5fe55fdb

    SHA256

    87a5d7b210d1d25ffe76e2d4f0eabdb2b21ad6be782ea3362d410a563fb3a16e

    SHA512

    3274965f6261e8b290193cf67edf090afbe7ada942cc15a43d6263740e2a179ce2f276e93ce69679b57f2e34e9a2d68808f8cc62d77f06ee255241572fb8d970

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    30cc9e886a56126fa08783a8c03d7e84

    SHA1

    76f33b51ee7c2b390175f1e86b9cbd78c8673682

    SHA256

    a9656692ed548968b0258911eac6b7cf46f08792a445fe4712a30440f731f329

    SHA512

    19a27b2a5d69da187e2d735c3b0d1094224149e75c7b010bd2462d90959d28ec7e38a9bf5d0a16c50b71d7e78410d8b244386260762481b8397eed756227b745

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f1c3354cde1b417cea107a79245d4102

    SHA1

    836d2c2616ec738e3179639f084c8bf0634e8f5f

    SHA256

    2d702eac1161f87f6affc1955dc4fb83a5564a733acc8cd83e65b43e68047fa0

    SHA512

    b995ab33a39e63f3a7b3e91f956f2e6d848779f66142469636cd0fb64b27383158394a8a3eeb86939d3cf1c3ae64ca540ad4adb9ff3d2c4e3ac1a5fac4a45530

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    6c47a77ff1f028782b10e0c4f88ffd31

    SHA1

    cb5508c5e13ecbb872baad5cf22098f5ed58b844

    SHA256

    deaf88f21099fbee26968742bb6619ab8e52dd157cec48b389c7dd2a70425bb3

    SHA512

    f5967b1bedcccbdf6d318b8567eb5ba7d0dd7ade88de3cde75df91b5f948a7a1d186502bc37e5f6edc3a0c53668899310f94b8fb01e157f1eb3c7678c41f6e69

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b8e3a571141a76f533d838348cd9e757

    SHA1

    e4443582ff5b8a2ad0b16bf2324ef8846d8b42cb

    SHA256

    d749c647d925d3b566ae94735af431229fb553e0844da67cd04807bb2b5335eb

    SHA512

    b5043d689e3901492cd9677f6c85c82b75ead94b8abb106aa75cdec8dacc95efb35a02734fc8751eab5f719aebc6f5937479331a55d74411e4b8bbb800b71553

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    0d8892aa9596b7af6e97e3dba50ecb3b

    SHA1

    80a582ed9097962091475d96b91fb607aeea8aa6

    SHA256

    c0d40010d14096df4c746f798624a0e6b319fc732e317271c4a58828e739b293

    SHA512

    fed7d201442a106ead0e56dea75f7f1c6dc769f692c85989d553be3630114e61e3319dd556c028de8302043e91915f9a26d1f8ef4157e79115a993cec438a922

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    78851216fd406709d4039d5f04ff0c16

    SHA1

    84381906c355b2e364660ab9832a267b1af16b2b

    SHA256

    15e7c388b4aa48300834471c102b21370480f07f6dc8eddf22475c1ed910f3ed

    SHA512

    05720620ba7fad6c20b51b6540e8d0d7db13c878e68efb266a8b8e76a31505f197e432f439e19f1b62d66707c074adaa9d216e480b4ab7f487d641a88f9e3c5d

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    79051759c803346aade47626715bdcd6

    SHA1

    202ce88ae01130e70993b40f69ad0743d9ed533a

    SHA256

    b3f45dbd12957df25d0dd8a5cd572227f0946671b21bc1cc2f830ec0574071f4

    SHA512

    9c0aa14b3f4f576ac95b083166afda8b3b23a6258e72bc2bed3e292ef7d2b0d0227186a2988723745a2f236ea3eb052f6899e8d655d26c44a38e28cf1147fbfa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    d6db120a819d39b5d3c55571b6d55a6a

    SHA1

    7a2f0edcf7aca450fa7156a7debb6828aa3b36a4

    SHA256

    a348b0e14400b7819ef31723e5143fb8d5a2f2dfa4bb7c4407dbc5140f76d8e1

    SHA512

    9c146fc676254fba4e28a2207337f7a3f0f9bc7b1e8881c8a5f84b578f9b685e1853017dc9307d5483860de64805b81fd7d333f4a76b9c070a0e017403e0cb36

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e6f3dff37753b87a5847dca43dfd8795

    SHA1

    5302cb829cf11ac6cc3fcf41784d91e187bf73f7

    SHA256

    6640c8c56eb34ff94f563cade12aac7a300df7031f505b66d28af34d23de07fc

    SHA512

    9adb627f567dc44498669b7790ec5e985433d894bba03941e2fa293c4f79d7c5b3f2d92f7d4e486df0932ce2b774eb58b64cd6d54c1418456fc400175a10be0b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    bc13282984be79122304a46b5538f7fc

    SHA1

    1a6555c5cad47e01a02bfdbc47ae2f16ba061537

    SHA256

    7306fb6d72e2fbc47a9f37502a66111374dafe36956dc7cd46787bc8072212d7

    SHA512

    66b6793b46c3fb6e48362e7e31e868d84eced7b535d4da242bd4b975e9fc2bd7e9662368c05ef91e44ca09eb50cdd936fbfb528efea932d76c5b7a2c39995383

  • C:\Users\Admin\AppData\Local\Temp\Cab74C4.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Cab7546.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar7549.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \??\c:\program files (x86)\microsoft office\office14\bcssync.exe

    Filesize

    750KB

    MD5

    911ef3bf4f95b78e9deb622d43c534b8

    SHA1

    667c603b189f25a4c8b8fa893fa4e66e53b6296f

    SHA256

    a235533a75387978e7c2d1702fc64cec4ed3fe27b59aad76757f272cfb7a951b

    SHA512

    3182abcece042a375287251d70f7deed29110af02b5236dd953bdb238a2fa9d02e94d8acb88d4cfb63388660dc72a3d015a893a75519e94970e10541f3e2b94c

  • \Program Files (x86)\Internet Explorer\wmpscfgs.exe

    Filesize

    754KB

    MD5

    e8471b59e27aa9cc9b12ed996da33312

    SHA1

    0f180682519cf28d56e80208aa43524db74f0f41

    SHA256

    29649371d2e29288577ee934a9ed6fd1a46fef2440e5f1d33521f9c0bc5678f9

    SHA512

    a6562a266efcb00fc1b3cc00531845422b87368bb3ce1630aca07693ac4eabab251e9f15eb27c5fbe755f0af87e4ef17a9ad327ffb84f2e341a6c153e8f2220c

  • memory/2832-23-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB

  • memory/2832-53-0x0000000000860000-0x0000000000862000-memory.dmp

    Filesize

    8KB

  • memory/2888-0-0x0000000010000000-0x0000000010010000-memory.dmp

    Filesize

    64KB